Language: English
Duration: 70 hours
Awarding Body: CISCO
Associated Certification: Cisco Certified CyberOps Associate
Associated Exam: Exam: 200-201 CBROPS
Course Description:
The thrilling world of cybersecurity offers opportunities to combat cybercrime, outsmart cyber espionage, and tackle a wide range of networking threats. As one of the fastest-growing fields, cybersecurity provides individuals with the in-demand skills needed to join a Security Operations Center (SOC) team. The course covers how SOC teams detect and respond to security incidents. It explores the intricacies of security concepts, monitoring, host-based analysis, network intrusion analysis, and security policy procedures. Additionally, the course aligns seamlessly with the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce framework, supporting consistent language for cybersecurity education, training, and workforce development.
Pre-Requisite:
None
Course Objectives:
After taking this course, you should be able to:
- Understand the Role of SOC Teams in Incident Detection and Response
- Explore Key Security Concepts and Monitoring Techniques
- Develop Skills in Host-Based and Network Intrusion Analysis
- Gain Insight into Security Policy Procedures
- Align Knowledge with the NICE Cybersecurity Workforce Framework
Course Content:
- Module 1: The Danger
- Module 2: Fighters in the War Against Cybercrime
- Module 3: The Windows Operating System
- Module 4: Linux Overview
- Module 5: Network Protocols
- Module 6: Ethernet and Internet Protocol (IP)
- Module 7: Connectivity Verification
- Module 8: Address Resolution Protocol
- Module 9: The Transport Layer
- Module 10: Network Services
- Module 11: Network Communication Devices
- Module 12: Network Security Infrastructure
- Module 13: Attackers and Their Tools
- Module 14: Common Threats and Attacks
- Module 15: Network Monitoring and Tools
- Module 16: Attacking the Foundation
- Module 17: Attacking What We Do
- Module 18: Understanding Defense
- Module 19: Access Control
- Module 20: Threat Intelligence
- Module 21: Cryptography
- Module 22: Endpoint Protection
- Module 23: Endpoint Vulnerability Assessment
- Module 24: Technologies and Protocols
- Module 25: Network Security Data
- Module 26: Evaluating Alerts
- Module 27: Working with Network Security Data
- Module 28: Digital Forensics and Incident Analysis and Response